This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Any lingering indifference to cybersecurity risk has evaporated in the face of spiking ransomware attacks, software supply chain threats , and the challenges of securing remote workers. That’s the clear message of CSO’s Global Intelligence Report: The State of Cybersecurity in 2021, fielded via online survey in May and June of this year.
Like most CSOs, Joe Sullivan was drawn to the role to help prevent cybercrimes. His role as CSO of Uber was something of a shift from his previous job prosecuting cybercriminals as an assistant US attorney, but closer to the tip of the cybersecurity spear. To read this article in full, please click here
Cybersecurity has steadily crept up the agenda of governments across the globe. This has led to initiatives designed to address cybersecurity issues that threaten individuals and organizations. To read this article in full, please click here
I am proud to say that the annual Life and Times of Cybersecurity Professionals report from ESG and ISSA is now available for free download. As part of the research for this report, we always ask cybersecurity professionals several questions about the global cybersecurity skills shortage. Sign up for CSO newsletters. ].
Over the past two years, the rise of big-ticket ransomware attacks and revelations of harmful software supply chain infections have elevated cybersecurity to the top of the government's agenda. Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here . |
Both efforts aim to prepare the nation for the next significant cybersecurity incidents, making up for lost time due to the previous administration's relative inattention to the topic. Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here
Cybersecurity buzzwords and buzz phrases are a dime a dozen. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Sign up for CSO newsletters. ]. Here are the 11 cybersecurity buzzwords and phrases that should be laid to rest in 2021.
The 5 th annual Life and Times of Cybersecurity Professionals report from ESG and the Information Systems Security Association ( ISSA ) provides valuable insight into the challenges cybersecurity pros face, how they see themselves relative to the rest of the organization, and what brings them job satisfaction, among many other data points.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. To read this article in full, please click here
The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here While complementary, the two projects are very different. Review the best Mitre D3FEND advice to harden Windows networks. |
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ].
In one of the most disruptive cybersecurity incidents to take place in the United States, Georgia-based Colonial Pipeline announced late Friday that it was the victim of a cyberattack, later confirmed to be a ransomware attack. Get the latest from CSO by signing up for our newsletters. ].
Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here Piled on top of that is a growing wave of ransomware and software supply chain attacks. . Learn the The 5 types of cyberattack you're most likely to face. |
Cybersecurity professionals interested in raising their profiles as subject matter experts can count on social media to become more visible. Step 1: Define your cybersecurity area of expertise and what success mean to you. To read this article in full, please click here With everyone being online this may not be enough though.
Neurodiversity within cybersecurity is progressively becoming a topic of regular, meaningful discussion across the sector. To read this article in full, please click here (Insider Story) To read this article in full, please click here (Insider Story)
Cybersecurity’s ongoing battle with a “skills shortage” has seen the sector lose its way regarding talent hiring and retention, says Christian Toon, CISO at London-based law firm Pinsent Masons. To read this article in full, please click here
Though often overlooked in favor of cybersecurity, physical security is equally important. Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here And, indeed, it has grown into a $30 billion industry. Learn what you need to know about defending critical infrastructure. |
Every chief security executive knows that one of the most important—and perhaps challenging—aspects of the job is getting the funding needed to support the cybersecurity program. Sign up for CSO newsletters. ]. “The To read this article in full, please click here
Jen Easterly, the freshly installed head of the Department of Homeland Security’s (DHS’s) Cybersecurity and Infrastructure Security Agency (CISA), unveiled yesterday a new federal initiative called the Joint Cyber Defense Collaborative (JCDC) which has been structured to help lead the development of the country’s cyber defense plans.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. To read this article in full, please click here Not all business password managers have feature parity with each other; in some cases it’s not even close.
But of course, cybersecurity is an ongoing battle between attack and defense, and the attackers continue to pose novel challenges. Sign up for CSO newsletters. ]. To read this article in full, please click here Keep up with 8 hot cyber security trends (and 4 going cold).
The cybersecurity skills gap has posed a challenge to organizations everywhere. Organizations are faced with many cybersecurity challenges without enough security professionals to address them. Access to cybersecurity education is not always accessible to these groups, which typically leads them to pursue other career paths.
Cybersecurity pros interested in metrics and measures frequently ponder and pontificate on what measures would be best to show the board of directors. Coming up with cybersecurity metrics from a business perspective can be a challenge. To read this article in full, please click here
XDR has a different name but a similar history and pedigree. [ Keep up with 8 hot cybersecurity trends (and 4 going cold). Sign up for CSO newsletters. ]. Based on this persistent digging, I have a few XDR observations: To read this article in full, please click here
Understanding why this is happening and exploring what lies ahead is essential for organizations aiming to sustain effective cybersecurity leadership. The growing complexity of regulatory requirements, such as the SEC's new cybersecurity reporting rules , adds another layer of strain.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. To read this article in full, please click here Yet dozens of potential errors, oversights, and mistakes both stupid and understandable make it an endless challenge.
Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. To read this article in full, please click here
The Department of Homeland Security's (DHS) Transportation Safety Administration (TSA) yesterday announced a second security directive that requires owners and operators of TSA-designated critical pipelines to implement cybersecurity measures that help protect against malicious digital incidents.
Google has announced a new entry-level cybersecurity certificate to teach learners how to identify common risks, threats, and vulnerabilities, as well as the techniques to mitigate them. To read this article in full, please click here
And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity. Why Machine Learning Has Become Vital for Cybersecurity The need for machine learning has to do with complexity.
If you want to know what’s new in cybersecurity, watch what the startup vendors are doing. To read this article in full, please click here They typically begin with an innovative idea and are unfettered by an installed base and its mainstream approach. Startups often tackle problems no one else is addressing.
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. A well-oiled relationship built on trust, communication and mutual understanding can reap significant benefits for a business’s cybersecurity posture. To read this article in full, please click here
After issuing cybersecurity requirements for pipeline companies via two directives earlier this year, the Transportation Safety Administration (TSA) will now also issue cybersecurity requirements for rail systems and airport operators. To read this article in full, please click here
Anyone who ever attended an RSA conference understands that cybersecurity vendors introduce hundreds of amazing, innovative products every year. To read this article in full, please click here That means enterprises need to deploy SD-WAN, secure access service edge (SASE) and zero trust network access (ZTNA).
Cybersecurity pro Alana Scott was building her skills and her career in the conventional manner: by attending conferences and looking to network. Diversity in security: Discover how 3 organizations are making a difference | Subscribe to CSO newsletters. ]. To read this article in full, please click here Nice to see you.’”.
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The cybersecurity piece of this typically focuses on incidents where these outcomes were caused by an intelligent adversary.)
Cybersecurity researchers work hard to keep the digital world safe, but every once in a while their own physical security is at risk. To read this article in full, please click here They don't want to put their loved ones at risk "because dad is a security researcher and attracts bad guys," he says.
It is a common refrain among senior folks in enterprise cybersecurity: “We have to learn to align with the business.” Unfortunately, it seems like we spend most of our time trying to get the business to “align with cybersecurity” and become frustrated when they don’t or can’t. To read this article in full, please click here
Even more alarming is that these attacks are happening despite businesses doubling down on their cybersecurity spend. Cybersecurity is at a critical inflection point where five megatrends are making the threat landscape riskier, more complicated, and costlier to manage than previously reported.
Cybersecurity continues to be high on the agenda of governments across the globe, with both national and local levels increasingly working to counter cybersecurity threats. Here are 22 notable cybersecurity initiatives introduced around the world in 2022. To read this article in full, please click here
Reading a list of cybersecurity compliance frameworks is like looking at alphabet soup: NIST CSF, PCI DSS, HIPAA, FISMA, GDPR…the list goes on. Cybersecurity best practices from the Center for Internet Security (CIS) provide prioritized and prescriptive guidance for a strong cybersecurity foundation.
A core pillar of a mature cyber risk program is the ability to measure, analyze, and report cybersecurity threats and performance. That said, measuring cybersecurity is not easy. What can be measured in cybersecurity? To read this article in full, please click here
In my last CSOarticle , I detailed cybersecurity professionals’ opinions on the characteristics of a mature cyber-threat intelligence (CTI) program. To read this article in full, please click here
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content